Table of Contents - Volume 6 Number 4

The Multi-Agents Immune System for Network Intrusions Detection (MAISID)

Pages : 383-390

Noria Benyettou1, Abdelkader Benyettou1, Vincent Rodin2 and Souad Yahia Berrouiguet3

View:    Abstract |  PDF  |  XML|

Network intrusion detection Systems are designed to protect computer networks by observing frames and notifying the operators when a possible attack happened. But with the development of network and the information exchange, networks became increasingly vulnerable faced at the new forms of threats. It is necessary to improve the performance of an intrusion detection system. Inspired by immune biological system behavior and the performances of the multi-agent systems, we present in this article a new model (MAISID) of multi-agent system immune for intrusion detection. MAISID is a system that performs frames analyses by a group of immune agents’ collaboration. These agents are distributed on the network to achieve simultaneous treatments, and are auto-adaptable to the evolution of the environment and have also the property of communication and coordination in order to ensure a good detection of intrusions in a distributed network. In this approach, the MAISID model is installed in each host of the network and sub-network for an extensive monitoring and a simultaneous analysis of the frames.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1048
[hupso]


A Methodology in Mobile Networks for Global Roaming

Pages : 391-396

Tanvir Habib Sardar

View:    Abstract |  PDF  |  XML|

This mobile network architecture will support terminal mobility, personal mobility, and service provider portability, making global roaming seamless. A location-independent Personal Telecommunication Number (PTN) scheme is conducive to implementing such a global mobile system. However, the non-geographic PTNs coupled with the anticipated large number of mobile user’s in future mobile networks may introduce very large centralized databases. This necessitates research into the design and performance of high-throughput database technologies used in mobile systems to ensure that future systems will be able to carry efficiently the anticipated loads. This is scalable, robust, efficient location database architecture based on the location-independent PTN. The proposed multi tree database architecture consists of a number of database subsystems, each of which is a three-level tree structure and is connected to the others only through its root. By exploiting the localized nature of calling and mobility patterns, the proposed architecture effectively reduces the database loads as well as the signalling traffic incurred by the location registration and call delivery procedures. In addition, two Memory-resident database indices, memory-resident direct file and T-tree are proposed for the location databases to further improve their throughput. Analysis model and numerical results are presented to evaluate the efficiency of the proposed database architecture. Results have revealed that the proposed database architecture for location management can effectively support the anticipated high user density in the future mobile networks.

Hide Abstract


Views 
   PDF Download PDF Downloads: 880
[hupso]


Control Algorithm to the Semantic Data Security in Computer Networks

Pages : 397-400

Khaled Sadeq Al-Shredei, Mohamad A. A. Al-Rababah and Nour E. Oweis

View:    Abstract |  PDF  |  XML|

In this paper we will talk about information technology semantic , which plays an important role in many areas of human activity and therefore the task of data security semantic is very important for information technology and will consider this research to support the idea of data semantic cards safety of RDF tri- called safety data. Also with the security of confidential data labels in different security levels in different departments have different ranges and variety of use of user data. There are ongoing contacts with the idea of safety data on the labels of three diverse In this research has identified the main rules to control user access to the data by comparing the levels of access to the user ( the security levels triple ) Based on these rules and advanced algorithms will do read and modify data RDF triple.

Hide Abstract


Views 
   PDF Download PDF Downloads: 912
[hupso]


Biometric Technology Based on Hand Vein

Pages : 401-412

Sarah Benziane and Abdelkader Benyettou

View:    Abstract |  PDF  |  XML|

After fingerprints or iris digital, biometric identification of an individual can now be done through the veins of the hand. This technique uses a “palm vein scanner”: it is an optical sensor capable of “photographing” the palm vein using the “near infrared rays.” This technique uses a “palm vein scanner”.Biometric authenticationbyrecognition offinger veinorpalmis especially developed by Hitachi and Fujitsuin Japansince 2005. Compared to thetechnologyusingfingerprint recognition, it offers the advantage of beingsafer andit does not involveany physical contactwith the sensor.Vein recognitionis performed byremote effectoptically. This paper presents a survey of the biometric systems technology based hand vein.We first review the component modules including the algorithms they employ. Finally, a summary of the accuracy results reported in the literature is also provided. Key words: 

Hide Abstract


Views 
   PDF Download PDF Downloads: 1090
[hupso]


Applications and Trends in Data Mining

Pages : 413-419

S.V.S. Ganga Devi

View:    Abstract |  PDF  |  XML|

The advent of Computing Technology has significantly influenced our lives and two major impacts of this effect are Business Data Processing and Scientific Computing. During the early years of the development of computer techniques for business, computer professionals were concerned with designing files to store the data so that information could be efficiently retrieved. There were restrictions on storage size for storing data and on the speed of accessing the data. Needless to say, the activity was restricted to a very few, highly qualified professional. Then came an era when Database management System simplified the task. The responsibility of intricate tasks, such as declarative aspects of the programs was passed on to the database administrator and the user could pose his query in simpler languages such as query languages. Thus almost any business-small, medium or large scale began using computers for day-to-day activities. Now what is the use of all this data? Up to the early 1990’s the answer to this was “NOT much”. No one was really interested in utilizing data, which was accumulated during the process of daily activities. As a result a new discipline in computer science, Data Mining gradually evolved.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1521
[hupso]


Providing a Method Based on the Path Indexes in Optimizing XML Queries

Pages : 421-427

Noshin Azimi and Shahla Kiani

View:    Abstract |  PDF  |  XML|

In this paper, initially, the description and the processing way of the existing queries and languages in this field is performed and a base is graded for the new method by classifying the present methods and evaluating on strengths and weaknesses of each method. This three-step approach is proposed to improve previous methods. The method involves three steps: 1. First step: Simplifying query and reducing the searching area. 2. Second step: Producing a result table as a guide for the query processor. 3. Third step: Processing the document nodes according to the guide table produced in the previous step. This three-step method can prove its ability compared to the previous methods. The method is developed so that it has the efficiency for complicated multi-branches queries. Then, it is tried to optimize the method, considering the concept of the extraction points. During the three steps, useless nodes – the nodes that either do not make a response for the user, or return a repetitive one – were used so much; using such nodes is reduced by introducing an index called level index.

Hide Abstract


Views 
   PDF Download PDF Downloads: 913
[hupso]


New Method for Image Features Extracting Based on Enhanced Chain Code

Pages : 429-433

Israa Hadi Ali

View:    Abstract |  PDF  |  XML|

In this paper, we have proposed image features based on chain code approach and RLE compression method for enhancing the image and proposed new method for extracting the features. The proposed method consist of the many steps, First is to apply the Chain code algorithm by using new chain code window, Second is to apply the Chain code Enhancement, in this step the chain code is first extracted and then enhanced by applying the RLE compression on the result, the purpose for this operation is to approximate the image by eliminate the small part of image and added it to the largest nearest part and the third is is to extract of chain code features by proposing a new algorithm.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1052
[hupso]


Automatic Railway Gate Control Using Microcontroller

Pages : 435-440

Krishna*, Shashi Yadav and Nidhi

View:    Abstract |  PDF  |  XML|

The objective of this paper is to control the railway tracks by using anti-collision techniques. The model of railway track controller is designed by using 8952 microcontroller to avoid railway accidents. When we go through the daily newspapers we come across many railway accidents occurring at unmanned railway crossings. This is mainly due to the carelessness in manual operations or lack of workers. And also the collision of two trains due to the same track. This model is implemented using sensor technique. We placed the sensors at a certain distance from the gate detects the approaching train and accordingly controls the operation of the gate. Also an indicator light has been provided to alert the motorists about the approaching train.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1703
[hupso]


A Survey on Radio Frequency Identification (RFID)

Pages : 441-448

Monika Jatiwal, Chetna Arora and Aastha Gupta

View:    Abstract |  PDF  |  XML|

This paper will describe the technology RFID that is Radio Frequency Identification and gives an overview of the current state of the art in the radio frequency identification (RFID) technology. It also tell how does it work and what are its applications and problems in RFID technology ? This paper presents a few applications that are possible using RFID technology such as locating lost items, tracking moving objects, and others . The convergence of lower cost and increased capabilities made businesses take a hard look at what RFID can do for them. Also its various types are described here.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1053
[hupso]


Pruning Process Influences on Recognition Rate of Skeletal Shapes

Pages : 449-456

Amir S. Almallah and Esraa Mohammed Hassoon

View:    Abstract |  PDF  |  XML|

This paper describes effect of Skeleton pruning process on recognition shapes or objects, Pruning is accomplished by removing branches which is redundant or unnecessary branches , The removal of these small branches does not alter the shape information. It is still quite a challenging problem because of the lack of standard measurements for the importance or significance of a branch. A pruning technique is adopted to deal with the large amount of data that results in further improvement in recognition accuracy. Experimental results showed that our method can achieve good retrieval results .The moderate pruning ratio has improved the features of the shape and improved recognition accuracy.

Hide Abstract


Views 
   PDF Download PDF Downloads: 968
[hupso]


Heart Disease Prediction System Using Data Mining Techniques

Pages : 457-466

Abhishek Taneja

View:    Abstract |  PDF  |  XML|

In today’s modern world cardiovascular disease is the most lethal one. This disease attacks a person so instantly that it hardly gets any time to get treated with. So diagnosing patients correctly on timely basis is the most challenging task for the medical fraternity. A wrong diagnosis by the hospital leads to earn a bad name and loosing reputation. At the same time treatment of the said disease is quite high and not affordable by most of the patients particularly in India. The purpose of this paper is to develop a cost effective treatment using data mining technologies for facilitating data base decision support system. Almost all the hospitals use some hospital management system to manage healthcare in patients. Unfortunately most of the systems rarely use the huge clinical data where vital information is hidden. As these systems create huge amount of data in varied forms but this data is seldom visited and remain untapped. So, in this direction lots of efforts are required to make intelligent decisions. The diagnosis of this disease using different features or symptoms is a complex activity. In this paper using varied d

Hide Abstract


Views 
   PDF Download PDF Downloads: 1506
[hupso]


Study and Analysis of Efficient AES Multi-Layer Key

Pages : 473-479

Mohammed Najm Abdullah and Rula Sami Khudhair

View:    Abstract |  PDF  |  XML|

Multi-layer key for AES encryption technique are present in this paper. LFSR and MD5 as a primary key layer was used to increase the security of the key. Three types of tests for ten round for each key layer are tested and analyzed. From the tests the MD5 is present as more suitable for security but it more complexity while LFSR is good for both. The usage of them will be depending on the natural of applications.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1003
[hupso]


Knowledge Models, current Knowledge Acquisition Techniques and Developments

Pages : 467-472

Truhsar Patel1 and Sanjay Thakkar2

View:    Abstract |  PDF  |  XML|

The development of intelligent healthcare support systems always requires a formalization of medical knowledge. Artificial Intelligence helps to represent the knowledge in various ways which is a very important part in developing any systems, which in turn leads to precise understanding of knowledge representations. This helps to obtain the solution to the problem very easily. Knowledge engineers make use of a number of ways of representing knowledge when acquiring knowledge from experts. These are usually referred to as knowledge models. Knowledge acquisition includes the elicitation, collection, analysis, modelling and validation of knowledge for knowledge engineering and knowledge management projects. This paper presents an overview of available knowledge models, current knowledge acquisition techniques and also the recent developments to improve the efficiency of the knowledge acquisition process.

Hide Abstract


Views 
   PDF Download PDF Downloads: 998
[hupso]


Control Algorithm to The Semantic D ata Security in Computer Networks

Pages : 397-400

Khaled Sadeq Al-shredei, Mohamad A. A. Al-Rababah and Nour E. Oweis

View:    Abstract |  PDF  |  XML|

In this paper we will talk about information technology semantic , which plays an important role in many areas of human activity and therefore the task of data security semantic is very important for information technology and will consider this research to support the idea of data semantic cards safety of RDF tri- called safety data. Also with the security of confidential data labels in different security levels in different departments have different ranges and variety of use of user data. There are ongoing contacts with the idea of safety data on the labels of three diverse In this research has identified the main rules to control user access to the data by comparing the levels of access to the user ( the security levels triple ) Based on these rules and advanced algorithms will do read and modify data RDF triple.

Hide Abstract


Views 
   PDF Download PDF Downloads: 912
[hupso]